Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 are vulnerable to stored cross-site scripting (XSS) via unescaped `portal_login_username` in the portal credential print view. A patient portal user can set their login username to an XSS payload, which then executes in a clinic staff member's browser when they open the "Create Portal Login" page for that patient. This crosses from the patient session context into the staff/admin session context. Version 8.0.0.2 fixes the issue.
Published: 2026-03-19
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS that can execute script in clinic staff or admin browsers
Action: Immediate Patch
AI Analysis

Impact

A stored cross‑site scripting vulnerability in OpenEMR allows a patient portal user to set a login username containing an XSS payload. When a clinic staff member opens the Create Portal Login page for that patient, the injected script runs in the staff member's browser, allowing an attacker to execute arbitrary client‑side code with the staff session context.

Affected Systems

The vulnerability affects OpenEMR installations before version 8.0.0.2. All users running those earlier releases are at risk, while version 8.0.0.2 and later contain the fix.

Risk and Exploitability

The CVSS score is 5.4, reflecting a moderate severity. The EPSS score is below 1%, indicating a low likelihood of observed exploits, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a legitimate patient portal account that can set a username; the attack then requires a staff member to view the credential print page, which is typically a routine administrative action. Given these constraints the overall risk remains moderate, but the impact of execution in an administrative session is significant.

Generated by OpenCVE AI on March 20, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEMR to version 8.0.0.2 or later
  • Verify that the new release is deployed on all systems running OpenEMR
  • Confirm that no legacy code remains that could re‑introduce the XSS issue

Generated by OpenCVE AI on March 20, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Thu, 19 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 are vulnerable to stored cross-site scripting (XSS) via unescaped `portal_login_username` in the portal credential print view. A patient portal user can set their login username to an XSS payload, which then executes in a clinic staff member's browser when they open the "Create Portal Login" page for that patient. This crosses from the patient session context into the staff/admin session context. Version 8.0.0.2 fixes the issue.
Title OpenEMR Vulnerable to Stored XSS via Unescaped portal_login_username in Credential Print View
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T19:46:49.755Z

Reserved: 2026-03-18T18:55:47.428Z

Link: CVE-2026-33303

cve-icon Vulnrichment

Updated: 2026-03-24T19:46:42.553Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:11.540

Modified: 2026-03-20T15:07:01.427

Link: CVE-2026-33303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:55:04Z

Weaknesses